Inpainting forgery detection using hybrid generative/discriminative approach based on bounded generalized Gaussian mixture model

Abstract We propose in this paper a novel reliable detection method to recognize forged inpainting images. Detecting potential forgeries and authenticating the content of digital images is extremely challenging and important for many applications. The proposed approach involves developing new probabilistic support vector machines (SVMs) kernels from a flexible generative statistical model named “bounded generalized Gaussian mixture model”. The developed learning framework has the advantage to combine properly the benefits of both discriminative and generative models and to include prior knowledge about the nature of data. It can effectively recognize if an image is a tampered one and also to identify both forged and authentic images. The obtained results confirmed that the developed framework has good performance under numerous inpainted images.

[1]  Sami Bourouis,et al.  Bayesian learning of finite generalized inverted Dirichlet mixtures: Application to object classification and forgery detection , 2014, Expert Syst. Appl..

[2]  Anderson Rocha,et al.  Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..

[3]  Hui Zhang,et al.  Bounded generalized Gaussian mixture model , 2014, Pattern Recognit..

[4]  Ahmad Mahmoudi Aznaveh,et al.  Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector , 2016, IEEE Transactions on Information Forensics and Security.

[5]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[6]  Xingming Sun,et al.  A passive authentication scheme for copy-move forgery based on package clustering algorithm , 2016, Multimedia Tools and Applications.

[7]  Sami Bourouis,et al.  Spatially Constrained Mixture Model with Feature Selection for Image and Video Segmentation , 2018, ICISP.

[8]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[9]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[10]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .

[11]  Haizhou Li,et al.  GMM-SVM Kernel With a Bhattacharyya-Based Distance for Speaker Recognition , 2010, IEEE Transactions on Audio, Speech, and Language Processing.

[12]  Fatma Najar,et al.  Unsupervised Human Action Categorization Using a Riemannian Averaged Fixed-Point Learning of Multivariate GGMM , 2018, ICIAR.

[13]  Sami Bourouis,et al.  Intrusion detection alert management for high-speed networks: current researches and applications , 2015, Secur. Commun. Networks.

[14]  Hamed Vahdat-Nejad,et al.  Towards a Better Understanding of Ubiquitous Cloud Computing , 2018, Int. J. Cloud Appl. Comput..

[15]  Sami Bourouis,et al.  Color image segmentation with bounded generalized Gaussian mixture model and feature selection , 2018, 2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).

[16]  David Haussler,et al.  Exploiting Generative Models in Discriminative Classifiers , 1998, NIPS.

[17]  Guillermo Sapiro,et al.  Image inpainting , 2000, SIGGRAPH.

[18]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[19]  Nizar Bouguila,et al.  Finite Generalized Gaussian Mixture Modeling and Applications to Image and Video Foreground Segmentation , 2007, Fourth Canadian Conference on Computer and Robot Vision (CRV '07).

[20]  Faisal R. Al-Osaimi,et al.  Bayesian inference by reversible jump MCMC for clustering based on finite generalized inverted Dirichlet mixtures , 2019, Soft Comput..

[21]  Davide Cozzolino,et al.  Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.

[22]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.

[23]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Shankar M. Krishnan,et al.  Image segmentation using finite mixtures and spatial information , 2004, Image Vis. Comput..

[25]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.

[26]  Vikas Maheshkar,et al.  An integrated method of copy-move and splicing for image forgery detection , 2018, Multimedia Tools and Applications.

[27]  Antoni B. Chan,et al.  A Family of Probabilistic Kernels Based on Information Divergence , 2004 .

[28]  Yuan Yan Tang,et al.  SIFT Keypoint Removal and Injection via Convex Relaxation , 2016, IEEE Transactions on Information Forensics and Security.

[29]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[30]  Heung-Kyu Lee,et al.  Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.

[31]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[32]  Chi-Man Pun,et al.  Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.

[33]  P. Deb Finite Mixture Models , 2008 .

[34]  Firas AlBalas,et al.  An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms , 2018, Int. J. Cloud Appl. Comput..

[35]  Alexander Wong,et al.  A nonlocal-means approach to exemplar-based inpainting , 2008, 2008 15th IEEE International Conference on Image Processing.

[36]  Fatma Najar,et al.  A Fixed-Point Estimation Algorithm for Learning the Multivariate GGMM: Application to Human Action Recognition , 2018, 2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE).

[37]  Qiuqi Ruan,et al.  Object Removal By Cross Isophotes Exemplar-based Inpainting , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[38]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.

[39]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[40]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[41]  Nizar Bouguila,et al.  Deriving kernels from generalized Dirichlet mixture models and applications , 2013, Inf. Process. Manag..

[42]  Vijay H. Mankar,et al.  Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..

[43]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[44]  SallayHassen,et al.  Intrusion detection alert management for high-speed networks , 2015 .

[45]  Patrick Pérez,et al.  Region filling and object removal by exemplar-based image inpainting , 2004, IEEE Transactions on Image Processing.

[46]  Qiong Wu,et al.  A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[47]  Sami Bourouis,et al.  A Flexible Statistical Model for Image Denoising , 2018, ICIAR.

[48]  R. Kondor,et al.  Bhattacharyya and Expected Likelihood Kernels , 2003 .

[49]  RochaAnderson,et al.  Going deeper into copy-move forgery detection , 2015 .

[50]  Nuno Vasconcelos,et al.  A Kullback-Leibler Divergence Based Kernel for SVM Classification in Multimedia Applications , 2003, NIPS.